Research Article
WRHT: A Hybrid Technique for Detection of Wormhole Attack in Wireless Sensor Networks
Table 1
Decision table for detecting wormhole attack.
| | | Node status | Node ranking |
| | | No wormhole attack | 1 | | | Suspected to be under wormhole attack | 2 | | | Suspected to be under wormhole attack | 2 | | | Malicious (under wormhole attack) | 3 |
|
|